Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Eda MarchettiISTI-CNRVerified email at isti.cnr.it
- Antonia BertolinoISTI-CNRVerified email at isti.cnr.it
- Said DaoudaghCNR - ISTIVerified email at isti.cnr.it
- Francesca MartelliIstituto di Informatica e Telematica (CNR)Verified email at iit.cnr.it
- Guglielmo De AngelisCNR-IASIVerified email at cnr.it
- Antonino SabettaSAP Security ResearchVerified email at sap.com
- Antinisca Di MarcoAssociate Professor at Universitŕ degli Studi di L'AquilaVerified email at univaq.it
- Breno MirandaAssistant Professor, Federal University of PernambucoVerified email at cin.ufpe.br
- Dr. Tejeddine Mouelhiresearcher in Software EngineeringVerified email at uni.lu
- Yves Le TraonProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
- Cesare BartoliniSnT - Interdisciplinary Centre for Security, Reliability and TrustVerified email at uni.lu
- Micael GallegoUniversidad Rey Juan CarlosVerified email at urjc.es
- Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
- Francisco GortázarUniversidad Rey Juan CarlosVerified email at urjc.es
- Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
- Gaetano GiuntaFull Professor of Telecommunications, University of Roma Tre, Chair of Digital Signal ProcessingVerified email at uniroma3.it
- Donia EL KATEBuniversity of LuxembourgVerified email at uni.lu
- Andrea PoliniUniversity of CamerinoVerified email at unicam.it
- Denitsa ManovaStudent, SU "Kliment Ohridski"Verified email at uni-sofia.bg
- Claudio PompilioTechnologist at Gran Sasso Science InstituteVerified email at gssi.it